Security services

Modern WAN architectures require additional network capabilities to support current higher bandwidth
and mission-critical applications. Requirements for deploying voice over IP (VoIP) and video
conferencing include high availability, IP multicast, and quality of service (QoS). Today, most
enterprises rely on private WAN connections such as Frame Relay, ATM, or leased-line services to
connect their businesses.

Security Attack: Any action that compromises the security of information.
Security Mechanism: A mechanism that is designed to detect, prevent, or recover from a security attack.
Security Service: A service that enhances the security of data processing systems and information transfers. A security service makes use of one or more security mechanisms.

Good administrators must know their competition. In this module we will explore some of the different way unauthorized access occurs and the security implications that open certain doors to attack. This is by no means an exhaustive examination and a great administrator must continue to perform reseach to keep apprised of new techniques as they are develpoped.

This design chapter evaluates securing an enterprise branch as it pertains to the Enterprise Branch
Architecture framework. The Enterprise Branch Architecture is one component in the overall Cisco
Service Oriented Network Architecture (SONA) that provides guidelines to accelerate applications,
business processes, and profitability. Based on the Cisco SONA framework, the Enterprise Branch
Architecture incorporates networked infrastructure services, integrated services, and application
networking services across typical branch networks, as shown in Figure 1....

Development of packet-switched data communication networking
technologies has been rapid in recent years, a phenomenon made
possible by the open standardization process and the potential
new territories for intellectual property creation. As a consequence,
new ways of creating services have been devised, bringing more
flexibility as compared to traditional telecommunications schemes.

During the last year there has hardly been an issue of a computer or business
magazine not flooded with buzzwords like e-commerce, Internet,
Web, or security. E-commerce (electronic commerce) is a result of moving
the economy to a new medium, namely the computer network. For the
most part, interconnected networks all over the world use a common set of
protocols (i.e., TCP/IP), thus making up the Internet.

We software architects and developers live in a fascinating time. With the release of the .NET
Framework in 2000, Web services technology has swept into our programming toolset and
into our collective consciousness. Web services are the killer application for XML. Web services
are the “new way” to call distributed objects remotely. Web services will take all of our integration
headaches away and allow formerly incompatible systems to communicate again. What
Microsoft developer has not recently thought to himself, “should I be building my application
with Web services?”...

As surprising as it sounds, there are still people out there who use well-known exploits,
such as war dialing, to gain unauthorized access. This term became popular with the ﬁlm
War Games and refers to a technique that involves the exploitation of an organization’s
telephone, dial, and private branch exchange (PBX) systems to penetrate internal network
and computing resources. All the attacker has to do is ﬁnd a user within the organization
with an open connection through a modem unknown to the IT staff or a modem that has
minimal or, at worst, no security services enabled.

Security Service – a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers
RFC 2828 – a processing or communication service that is provided by a system to give a specific kind of protection to system resources; security services implement security policies and are implemented bt security mechanisms.

transport layer security service
originally developed by Netscape
version 3 designed with public input
subsequently became Internet standard known as TLS (Transport Layer Security)
uses TCP to provide a reliable end-to-end service
SSL has two layers of protocols

Objectives of Chapter 13: To define a digital signature; to define security services provided by a digital signature; to define attacks on digital signatures; to discuss some digital signature schemes, including RSA, ElGamal, Schnorr, DSS, and elliptic curve; to describe some applications of digital signatures.

Java Web Services shows you how to use SOAP to perform remote method calls and message
passing; how to use WSDL to describe the interface to a web service or understand
the interface of someone else's service; and how to use UDDI to advertise (publish) and look
up services in each local or global registry. Java Web Services also discusses security issues,
interoperability issues, integration with other Java enterprise technologies like EJB; the work
being done on the JAXM and JAX-RPC packages, and integration with Microsoft's .NET
services....